-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CAHC missing CA cert for Red Hat #329
Comments
Hmm, so something dropped it as a dep? I suppose we could manually add it back in the manifest, though it'd be nice to track down what dropped the dep and why. |
I mean, this is a testing stream...i'm not opposed to the hammer approach. |
Without actually investigating my offhand guess is that something in CentOS chagned to explicitly neuter that package in 7.5. |
This is still an issue in the latest CAHC builds... I tried to dig through the dependencies and what not:
The spec file for So....kind of back to where we started. ¯_(ツ)_/¯ Seems to support what @cgwalters said about the certs getting neutered. Not sure where to look for evidence of that. |
This appears to affect all of CentOS https://lists.centos.org/pipermail/centos-devel/2018-June/016749.html |
The i-s-t has been failing for longer than I would care to admit because of CentOS/sig-atomic-buildscripts#329 and there's been little movement in the direction of fixing that. So we'll workaround the deficincieny by using two lists of images, one that works for CentOS derived streams and another that works for the rest.
The i-s-t has been failing for longer than I would care to admit because of CentOS/sig-atomic-buildscripts#329 and there's been little movement in the direction of fixing that. So we'll workaround the deficincieny by using two lists of images, one that works for CentOS derived streams and another that works for the rest.
CentOS AH is missing the Red Hat CA cert, so it is unable to pull images from the registry (see: CentOS/sig-atomic-buildscripts#329). To workaround this, we'll have to build the list of images to pull differently for CentOS vs. the rest.
CentOS AH is missing the Red Hat CA cert, so it is unable to pull images from the registry (see: CentOS/sig-atomic-buildscripts#329). To workaround this, we'll have to build the list of images to pull differently for CentOS vs. the rest.
* roles: podman_pull_run_remove This introduces a new role named `podman_pull_run_remove` which is a implementation of `docker_pull_run_remove` using `podman`. The role has been enhanced to test basic running of containers and also testing network access from the container. (These enhancements should likely be applied to `docker_pull_run_remove`, too). * i-s-t: add basic podman tests Let's start testing `podman` on the hosts that support it. * roles: fix centos container image location * roles: use alternate set of images for CentOS CentOS AH is missing the Red Hat CA cert, so it is unable to pull images from the registry (see: CentOS/sig-atomic-buildscripts#329). To workaround this, we'll have to build the list of images to pull differently for CentOS vs. the rest.
@miabbott I just built a 3.10 OKD cluster on centos7 with ansible and containerized gluster for dynamic storage. I had run a git checkout release-3.10 for https://github.com/openshift/openshift-ansible.git in late october / november to build the cluster. Upgrading with Gluster is a bit more difficult than just running the upgrade script. Is there a workaround to this? Could I inject the cert into the worker nodes to get around this issue? I've wanted to demo the .Net examples to some of our dev team working with .Net but running into issues pulling images from RedHat on OKD 3.10. |
@brianUK007 I decided to have another look at this to see what I can find. The idea that the CA certs are getting neutered as part of the build process appears to be confirmed. I believe I found the proper spec file which shows an explicit removal of the certs on CentOS: https://git.centos.org/blob/rpms!subscription-manager.git/c7/SPECS!subscription-manager.spec#L562 But, the registry still has to offer its cert when negotiating SSL, so we can grab it and stick it where it needs to be. Using some help from StackOverflow, I grabbed the cert and stuck it in the right place for
I'm not sure what |
Thanks Micah
THIS E-MAIL MAY CONTAIN CONFIDENTIAL AND/OR PRIVILEGED INFORMATION.
IF YOU ARE NOT THE INTENDED RECIPIENT (OR HAVE RECEIVED THIS E-MAIL
IN ERROR) PLEASE NOTIFY THE SENDER IMMEDIATELY AND DESTROY THIS
E-MAIL. ANY UNAUTHORISED COPYING, DISCLOSURE OR DISTRIBUTION OF THE
MATERIAL IN THIS E-MAIL IS STRICTLY FORBIDDEN.
IN ACCORDANCE WITH MIFID II RULES ON INDUCEMENTS, THE FIRM'S EMPLOYEES
MAY ATTEND CORPORATE ACCESS EVENTS (DEFINED IN THE FCA HANDBOOK AS
"THE SERVICE OF ARRANGING OR BRINGING ABOUT CONTACT BETWEEN AN INVESTMENT
MANAGER AND AN ISSUER OR POTENTIAL ISSUER"). DURING SUCH MEETINGS, THE
FIRM'S EMPLOYEES MAY ON NO ACCOUNT BE IN RECEIPT OF INSIDE INFORMATION
(AS DESCRIBED IN ARTICLE 7 OF THE MARKET ABUSE REGULATION (EU) NO 596/2014).
(https://www.handbook.fca.org.uk/handbook/glossary/G3532m.html)
COMPANIES WHO DISCLOSE INSIDE INFORMATION ARE IN BREACH OF REGULATION
AND MUST IMMEDIATELY AND CLEARLY NOTIFY ALL ATTENDEES. FOR INFORMATION
ON THE FIRM'S POLICY IN RELATION TO ITS PARTICIPATION IN MARKET SOUNDINGS,
PLEASE SEE https://www.horizon-asset.co.uk/market-soundings/.
HORIZON ASSET LLP IS AUTHORISED AND REGULATED
BY THE FINANCIAL CONDUCT AUTHORITY.
From: Micah Abbott [mailto:[email protected]]
Sent: Wednesday, November 21, 2018 3:05 PM
To: CentOS/sig-atomic-buildscripts
Cc: Brian Saltzman; Mention
Subject: Re: [CentOS/sig-atomic-buildscripts] CAHC missing CA cert for Red Hat (#329)
@brianUK007<https://github.com/brianUK007> I decided to have another look at this to see what I can find. The idea that the CA certs are getting neutered as part of the build process appears to be confirmed. I believe I found the proper spec file which shows an explicit removal of the certs on CentOS:
https://git.centos.org/blob/rpms!subscription-manager.git/c7/SPECS!subscription-manager.spec#L562<https://git.centos.org/blob/rpms!subscription-manager.git/c7/SPECS!subscription-manager.spec#L562>
But, the registry still has to offer its cert when negotiating SSL, so we can grab it and stick it where it needs to be.
Using some help from StackOverflow<https://stackoverflow.com/a/35442314>, I grabbed the cert and stuck it in the right place for docker:
# docker pull registry.access.redhat.com/rhel7/openscap<http://registry.access.redhat.com/rhel7/openscap>
Using default tag: latest
Trying to pull repository registry.access.redhat.com/rhel7/openscap<http://registry.access.redhat.com/rhel7/openscap> ...
open /etc/docker/certs.d/registry.access.redhat.com/redhat-ca.crt: no such file or directory
# openssl s_client -showcerts -servername registry.access.redhat.com -connect http://registry.access.redhat.com:443<http://registry.access.redhat.com:443> </dev/null 2>/dev/null | openssl x509 -text > /etc/rhsm/ca/redhat-uep.pem
# docker pull registry.access.redhat.com/rhel7/openscap<http://registry.access.redhat.com/rhel7/openscap>
Using default tag: latest
Trying to pull repository registry.access.redhat.com/rhel7/openscap<http://registry.access.redhat.com/rhel7/openscap> ...
latest: Pulling from registry.access.redhat.com/rhel7/openscap<http://registry.access.redhat.com/rhel7/openscap>
9a1bea865f79: Pull complete
602125c154e3: Pull complete
4f39a853bed4: Pull complete
20c68cea93f0: Pull complete
Digest: sha256:aa5ddb23af242da108ee0cfe227a96ced06ad398e4c8bb201aa837ca2837e432
Status: Downloaded newer image for registry.access.redhat.com/rhel7/openscap:latest<http://registry.access.redhat.com/rhel7/openscap:latest>
I'm not sure what redhat-entitlement-authority.pem is needed for (or where to get it), but this at least should get to the point where you can pull images with docker.
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub<#329 (comment)>, or mute the thread<https://github.com/notifications/unsubscribe-auth/AgsNM2vf5aoH3cxCzez5_Yhpl7ZWd1NZks5uxWuPgaJpZM4T-WrU>.
|
The sanity tests on CAHC have been failing for an embarrassing amount of time, but I just did some digging after @jlebon asked about it.
The root cause looks like a missing CA cert for Red Hat things. This was observed when doing a
docker pull
from the registry:The
redhat-ca.crt
file is usually a symlink to/etc/rhsm/ca/redhat-uep.pem
. On the CAHC stream, this was provided bypython-rhsm-certificates
, but recent composes have caused this package to drop out of the compose. (FWIW, on RHELAH the cert is provided bysubscription-manager-rhsm-certificates
, but this package is basically empty in CentOS land)The first compose where it appears this package was removed was on April 26, commit
4d12023435213f8c639337679d3f093f0188cfe8eaf77f4d5963ba5e35aea7e7
The text was updated successfully, but these errors were encountered: